Abstract is missing.
- TRUST in Integrated Circuits and 3rd Party IPDean Collins. 1 [doi]
- Sensitivity Analysis to Hardware Trojans using Power Supply Transient SignalsReza M. Rad, Jim Plusquellic, Mohammad Tehranipoor. 3-7 [doi]
- At-Speed Delay Characterization for IC Authentication and Trojan Horse DetectionJie Li, John Lach. 8-14 [doi]
- Detecting Malicious Inclusions in Secure Hardware: Challenges and SolutionsXiaoxiao Wang, Mohammad Tehranipoor, Jim Plusquellic. 15-19 [doi]
- Slicing Up a Perfect Hardware Masking SchemeZhimin Chen, Patrick Schaumont. 21-25 [doi]
- Place-and-Route Impact on the Security of DPL Designs in FPGAsSylvain Guilley, Sumanta Chaudhuri, Jean-Luc Danger, Laurent Sauvage, Philippe Hoogvorst, Maxime Nassar, Tarik Graba, Vinh-Nga Vong. 26-32 [doi]
- A High-Performance, Low-Overhead, Power-Analysis-Resistant, Single-Rail Logic StyleEric Menendez, Ken Mai. 33-36 [doi]
- The Role of Platform Integrity in Trustworthy SystemsKevin Schutz. 37-37 [doi]
- A Region Based Approach for the Identification of Hardware TrojansMainak Banga, Michael S. Hsiao. 40-47 [doi]
- On-Demand Transparency for Improving Hardware Trojan DetectabilityRajat Subhra Chakraborty, Somnath Paul, Swarup Bhunia. 48-50 [doi]
- Hardware Trojan Detection Using Path Delay FingerprintYier Jin, Yiorgos Makris. 51-57 [doi]
- Verifying the Authenticity of Chip Designs with the DesignTag SystemTom Kean, David McLaren, Carol Marsh. 59-64 [doi]
- Circuit CAD Tools as a Security ThreatJarrod A. Roy, Farinaz Koushanfar, Igor L. Markov. 65-66 [doi]
- The Butterfly PUF: Protecting IP on every FPGASandeep S. Kumar, Jorge Guajardo, R. Maes, Geert Jan Schrijen, Pim Tuyls. 67-70 [doi]
- Unified Digit-Serial Multiplier and Inverter in Finite Field GF(2:::m:::)Junfeng Fan, Ingrid Verbauwhede. 72-75 [doi]
- IC Activation and User Authentication for Security-Sensitive SystemsJiawei Huang, John Lach. 76-80 [doi]
- Designer s Hardware Trojan HorseYousra Alkabani, Farinaz Koushanfar. 82-83 [doi]
- Reassessing the TCG Specifications for Trusted Computing in Mobile and Embedded SystemsJohann Großschädl, Tobias Vejda, Dan Page. 84-90 [doi]
- Trustworthy System Security through 3-D Integrated HardwareTed Huffmire, Jonathan Valamehr, Timothy Sherwood, Ryan Kastner, Timothy E. Levin, Thuy D. Nguyen, Cynthia E. Irvine. 91-92 [doi]
- A Hardware-Assisted Data Hiding Based Approach in Building High-Performance Trusted Computing SystemsMalcolm Taylor, Chi-En Yin, Min Wu, Gang Qu. 93-96 [doi]
- An Embedded Flash Memory Vault for Software Trojan ProtectionFrancis G. Wolff, Christos A. Papachristou. 97-99 [doi]
- A Solution for On-Line TRUST ValidationMiron Abramovic. 100-100 [doi]